Venafi / blueprint-securesoftwarepipelineLinks
For engineers and security teams driving fast and secure software supply chains
☆83Updated 2 years ago
Alternatives and similar repositories for blueprint-securesoftwarepipeline
Users that are interested in blueprint-securesoftwarepipeline are comparing it to the libraries listed below
Sorting:
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- The Open Threat Modeling Format (OTM) defines a platform independent way to define the threat model of any system.☆177Updated 10 months ago
- A curated list of policy-as-code resources like blogs, videos, and tools to practice on for learning Policy-as-Code.☆197Updated last year
- Documenting your Threat Models with HCL☆433Updated this week
- Count distinct contributor of Snyk watched repos across several SCM☆32Updated last month
- Open Source Software Secure Supply Chain Framework☆236Updated 2 years ago
- The S2C2F Project is a group working within the OpenSSF's Supply Chain Integrity Working Group formed to further develop and continuously…☆215Updated 4 months ago
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- Rego policies for enterprise-scale Compliance-as-Code with OPA Conftest.☆59Updated 2 years ago
- ☆16Updated last year
- Open Cloud Security Posture Management Engine☆342Updated 3 years ago
- ☆122Updated 4 months ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated this week
- Evaluate source control (GitHub) security posture☆251Updated 2 years ago
- ☆115Updated 2 months ago
- Witness is a pluggable framework for software supply chain risk management. It automates, normalizes, and verifies software artifact pro…☆497Updated this week
- ☆285Updated 2 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- threatspec - continuous threat modeling, through code☆367Updated 4 years ago
- Compares and analyzes GCP IAM roles.☆77Updated 7 months ago
- ☆540Updated 2 weeks ago
- Open source compliance tool for development platforms.☆288Updated last year
- A tool to check the security settings of Github Organizations.☆72Updated 2 years ago
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- The Amazon Elastic Kubernetes Service (EKS) Creation Engine (ECE) is a Python command-line program created by the Lightspin Office of the…☆41Updated 2 years ago
- Rapidly apply hundreds of security controls in Azure☆184Updated 5 months ago
- AWS Organizations Service Control Policies (SCPs) written in HashiCorp Terraform.☆244Updated last year
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆158Updated 2 years ago
- A list of cloud security tools and vendors.☆180Updated last year